Facet browsing currently unavailable
Page 4 of 2405323 results
Sort by: relevance publication year
Figure 2: Malware detection using static analysis. COMPONENT published |
SigMal PROCEEDINGS ARTICLE published 9 December 2013 in Proceedings of the 29th Annual Computer Security Applications Conference Research funded by Office of Naval Research (N00014-11-10111) | Division of Computer and Network Systems (CNS-0845559, CNS-0905537) | Army Research Office (W911NF0910553) |
BTLab: A System-Centric, Data-Driven Analysis and Measurement Platform for BitTorrent Clients PROCEEDINGS ARTICLE published July 2011 in 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN) |
Evaluating the impact of automated intrusion response mechanisms PROCEEDINGS ARTICLE published in 18th Annual Computer Security Applications Conference, 2002. Proceedings. |
Static and Dynamic Analysis of Android Malware PROCEEDINGS ARTICLE published 2017 in Proceedings of the 3rd International Conference on Information Systems Security and Privacy |
OmniUnpack: Fast, Generic, and Safe Unpacking of Malware PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) |
Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic Analysis PROCEEDINGS ARTICLE published 2018 in Proceedings of the 4th International Conference on Information Systems Security and Privacy |
Client-side cross-site scripting protection JOURNAL ARTICLE published October 2009 in Computers & Security |
Know Your Achilles' Heel PROCEEDINGS ARTICLE published 7 December 2015 in Proceedings of the 31st Annual Computer Security Applications Conference Research funded by ARO (W911NF-09-1-0553) | NSF (CNS-1408632) |
Distance Metric Learning using Particle Swarm Optimization to Improve Static Malware Detection PROCEEDINGS ARTICLE published 2020 in Proceedings of the 6th International Conference on Information Systems Security and Privacy |
DUET PROCEEDINGS ARTICLE published 9 December 2013 in Proceedings of the 29th Annual Computer Security Applications Conference |
Malware Behavior Clustering BOOK CHAPTER published 2011 in Encyclopedia of Cryptography and Security |
Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries JOURNAL ARTICLE published 15 April 2009 in Journal of Computer Security |
Ex-Ray PROCEEDINGS ARTICLE published 4 December 2017 in Proceedings of the 33rd Annual Computer Security Applications Conference Research funded by National Science Foundation (CNS-1409738) | Engineering and Physical Sciences Research Council (EP/N008448/1) |
Analyzing and Detecting Malicious Flash Advertisements PROCEEDINGS ARTICLE published December 2009 in 2009 Annual Computer Security Applications Conference |
A Review Paper of Malware Detection Using API Call Sequences PROCEEDINGS ARTICLE published May 2019 in 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS) |
Experimental Evaluation of Description Logic Concept Learning Algorithms for Static Malware Detection PROCEEDINGS ARTICLE published 2021 in Proceedings of the 7th International Conference on Information Systems Security and Privacy |
A Practical Attack to De-anonymize Social Network Users PROCEEDINGS ARTICLE published 2010 in 2010 IEEE Symposium on Security and Privacy |
Android Malware Detection Combined with Static and Dynamic Analysis PROCEEDINGS ARTICLE published 15 November 2019 in Proceedings of the 2019 9th International Conference on Communication and Network Security |
A static heuristic approach to detecting malware targets JOURNAL ARTICLE published 25 November 2015 in Security and Communication Networks |